@@ -72889,11 +72889,19 @@ var __WEBPACK_AMD_DEFINE_FACTORY__, __WEBPACK_AMD_DEFINE_ARRAY__, __WEBPACK_AMD_
72889
72889
async encryptMessage(plaintext) {
72890
72890
// The client MUST use fresh, randomly generated key/IV pairs
72891
72891
// with AES-128 in Galois/Counter Mode (GCM).
72892
- const iv = crypto.getRandomValues(new window.Uint8Array(16)),
72892
+ // For GCM a 12 byte IV is strongly suggested as other IV lengths
72893
+ // will require additional calculations. In principle any IV size
72894
+ // can be used as long as the IV doesn't ever repeat. NIST however
72895
+ // suggests that only an IV size of 12 bytes needs to be supported
72896
+ // by implementations.
72897
+ //
72898
+ // https://crypto.stackexchange.com/questions/26783/ciphertext-and-tag-size-and-iv-transmission-with-aes-in-gcm-mode
72899
+ const iv = crypto.getRandomValues(new window.Uint8Array(12)),
72893
72900
key = await crypto.subtle.generateKey(KEY_ALGO, true, ["encrypt", "decrypt"]),
72894
72901
algo = {
72895
72902
'name': 'AES-GCM',
72896
72903
'iv': iv,
72904
+ 'additionalData': new Uint8Array(1),
72897
72905
'tagLength': TAG_LENGTH
72898
72906
},
72899
72907
encrypted = await crypto.subtle.encrypt(algo, key, u.stringToArrayBuffer(plaintext)),
@@ -72916,6 +72924,7 @@ var __WEBPACK_AMD_DEFINE_FACTORY__, __WEBPACK_AMD_DEFINE_ARRAY__, __WEBPACK_AMD_
72916
72924
algo = {
72917
72925
'name': "AES-GCM",
72918
72926
'iv': u.base64ToArrayBuffer(obj.iv),
72927
+ 'additionalData': new Uint8Array(1),
72919
72928
'tagLength': TAG_LENGTH
72920
72929
};
72921
72930
return u.arrayBufferToString((await crypto.subtle.decrypt(algo, key_obj, cipher)));
0 commit comments